Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)

Slides:



Advertisements
Similar presentations
Building Team Connections in a Health Sciences Library Using the DiSC® Profile Nancy Allee, AHIP, Deputy Director, and Jane Blumenthal, AHIP, Director,
Advertisements

Introduction to Entrepreneurship and New Venture Creation Rui Baptista
1 Family-Centred Practice. What is family-centred practice? Family-centred practice is characterised by: mutual respect and trust reciprocity shared power.
THE UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Improving IM Collaboration in the Workplace Kirstin Williams COMP
The 12th Annual Meeting of Women in Cognitive Science Thursday, November 15, 2012 Minneapolis.
Bullying Prevention Catherine Bradshaw, Ph.D., M.Ed. Johns Hopkins Center for the Prevention of Youth Violence (CDC) Johns Hopkins Center for Prevention.
Lero© 2010 Software Quality & Process Improvement Dr. Ita Richardson Lero – the Irish Software Engineering Research Centre and Department of Computer Science.
Providing Artifact Awareness to a Distributed Group through Screen Sharing Kimberly Tee, University of Calgary Saul Greenberg, University of Calgary Carl.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Before the transition…So far during the transition… 1. There wasn't much communication to the customers (or even, it seemed, to the FAS-IT staff) about.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Faculty of Computer Science Dalhousie University whalen at cs dot dal dot.
Instant Messaging by Kimberly Tee CPSC 781 University of Calgary Outline What is IM? IM as groupware.
Engineering Professionalism Nathan Delson January 2010.
Computer Supported Cooperative Work (CSCW) and Computer Mediated Communication (CMC)
Organizational Change and Development. Overview Sources of change Systems view of change Sources of resistance to change Overcoming resistance Lewin’s.
CHAPTER 1 INTRODUCTION TO MANAGEMENT. CHAPTER 1 INTRODUCTION TO MANAGEMENT.
Managing Conflict, Politics, and Negotiation
Copyright c 2006 Oxford University Press 1 Chapter 5 Building Group Communication Competence College students report— Ideal group member Competent communicator.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
Coaching Concepts Presented by: Elizabeth Ruiz, Carolina Leverette and Laura Mejia.
Social Networking in Education Presented by Justin R. Clark.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
10 key skills to enhance employability K V Sarma Jonnavithula.
Using hotlines to improve women’s access to information in legally restricted settings Bangkok, March 9-11, 2012 Challenges for documenting hotlines’s.
Creating a Knowledge Sharing Culture
1.Macbeth et al. (2012): Procurement and supply in projects: Misunderstood and under- researched. Project Management Institute. 2.Pesämaa et al. (2009):
Sunsern, R., Ph.D* Pothong,J., MSc Rukkaumsook, S., MSc
From Evidence to Action: Addressing Challenges to Knowledge Translation in RHAs The Need to Know Team Meeting May 30, 2005.
Managing Conflict, Politics, and Negotiation chapter seventeen McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Managing Conflict, Politics, and Negotiation
The leadership piece. What does the leadership concept mean?  Leadership is chiefly about dealing with the intangibles and the most frustrating situations.
CHAPTER 11 Episodes, Contexts, and Intercultural Interactions
EPISODES, CONTEXTS, AND INTERCULTURAL INTERACTIONS
Interstate New Teacher Assessment and Support Consortium (INTASC)
Chapter 12 The Impact of Globalization on Customer Service
Outline of Presentation 1.Mission, Vision and Values for Task Force 2.Definition of Engagement 3.Explanation of Research-Informed Framework 4.Characteristics.
Global Software Development. Awareness in the Wild: Why Communication Breakdowns Occur Case study Collection and analysis methods Organizational culture.
Initial Findings from Evaluation of Service Improvement Activity Dr Zoe Radnor Giovanni Bucci AtoZ Business Consultancy.
Hackathons for Scientific Software How and When do they Work? Erik H. Trainer, Chalalai Chaihirunkarn, Arun Kalyanasundaram, James D. Herbsleb.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Home 1 Career Counseling and Services: A Cognitive Information Processing Approach James P. Sampson, Jr., Robert C. Reardon, Gary W. Peterson, and Janet.
Chapter 12 Building Effective Relationships. Leader Effectiveness and Adaptability Description (LEAD) measures three areas of leader behavior: Style 
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Social Care Theory for Practice Values. A Definition of Values Values are part of our personality and direct how we behave, think and therefore how we.
Community Board Orientation 6- Community Board Orientation 6-1.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Table 3.1 Teachers’ Highest Degrees Held Less than bachelor’s 14.6% 7.0% 2.9%0.9%0.4%0.3%0.6%0.3% Bachelor’s61.9%69.6%
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
© Prentice Hall, 2005 Business Communication Today 8eChapter Communicating in Teams and Mastering Listening and Nonverbal Communication.
Session Objectives Analyze the key components and process of PBL Evaluate the potential benefits and limitations of using PBL Prepare a draft plan for.
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
 2015 Intercultural Services | Standard Modules Since 1994 Intercultural Services offers Cultural Intelligence to help companies  Attract and integrate.
1 Chapter 4: User Interface Design. 2 Introduction … Purpose of user interface design:-  Easy to learn  Easy to use  Easy to understand.
R&D  BBC MMX BBC Second Screens Study Maxine Glancy (BBC) & Connor Graham (freelance researcher)
HL7 Coordination of Care Services Project April 14 th, 2014.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Evaluating Screen Time Reduction Initiatives: The Washington State Story Donna Johnson, RD, PhD Center for Public Health Nutrition University of Washington.
Unit 8: Implementation, Part II Seminar Wednesday pm ET.
Chapter 10 Learning and Development in a Knowledge Setting
WELCOME TO UNIT 7. Unit 7 The Impact of Globalization on Customer Service Objectives Understand the impact globalization has had on the world economy.
Chapter 14 Reference Groups and Family
Being a GAL in Tribal Court NAILS Pre-NLADA Indian Law Training Paul Stenzel – Stenzel Law Office LLC November 6, 2007.
Avoiding (Un)Intentional Discrimination When Recruiting via Social Media Stephanie R. Thomas, Ph.D. Thomas Econometrics
Inhabiting online social spaces: Social presence and online social processes Benjamin Kehrwald Massey University College of Education.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Improving the Quality of Adult Engagement in Children’s Learning
Chapter 15 User Interface Design
Chapter 2 Focusing on Interpersonal and Group Communication
Radhika Jain Sandra Richardson
Presentation transcript:

Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center) Alfred Kobsa University of California, Irvine

Thursday, July 8, 2004DIMACS Workshop, NJ Motivation For effective and efficient collaboration and coordination across distance, individuals need as much information as possible about the activities of other team members. This need for awareness of other team members may, however, be in conflict with team members’ individual desires of privacy. PRIVACYAWARENESS

Thursday, July 8, 2004DIMACS Workshop, NJ Motivation Understanding current practices and expectations may help build more privacy- sensitive frameworks for capturing, maintaining, providing and seeking awareness information. Such systems will empower users to seamlessly (and continually) find the right balance between privacy and awareness using socio-technical means.

Thursday, July 8, 2004DIMACS Workshop, NJ Research Questions Balancing Awareness and Privacy –Is it a problem? –How is it handled today? –Can technology help? We have used Instant Messaging (IM) as a starting point for exploring these issues.

Thursday, July 8, 2004DIMACS Workshop, NJ Importance of IM Privacy IM is being increasingly used in collaboration But indications of privacy concerns in several studies –Grinter and Palen (2002) “Instant Messaging in Teen Life” –Begole et. al. (2002) “Work Rhythms: Analyzing Visualizations of Awareness Histories of Distributed Groups” Different responses: –Organizational policies: still in the evolution stage –Privacy policies in IM systems: different in every system –Privacy settings in IM systems: different for every system –Personal strategies?? Unclear, vary widely?

Thursday, July 8, 2004DIMACS Workshop, NJ Semi-structured Interviews 7 Diverse Subjects –Software Developer –Graphic Designer –Software Engineer –Doctoral Student –Technical Support Staff –Engineer –Undergraduate Student ~ 1 1/2 hour interviews –Recorded and transcribed 5 Males, 2 Females Mid 20s – Early 30s –Except undergraduate (20), and Engineer (> 55) 4 interviews conducted at location where IM is used the most No compensation

Thursday, July 8, 2004DIMACS Workshop, NJ Findings Three common concerns Privacy from non-contacts desire for very high degree of privacy from people not on contact lists Privacy regarding availability privacy from interruption or distraction from the current task Privacy regarding content desire to prevent contents of IM communication from being available to unintended third parties

Thursday, July 8, 2004DIMACS Workshop, NJ Privacy from Non-contacts Non-contacts: –Strangers with unknown intentions Contacts: –Trusted Acquaintances –Lowered Privacy Barrier No public profile (exception undergraduate) Users are careful about who is added

Thursday, July 8, 2004DIMACS Workshop, NJ Privacy Regarding Availability Privacy from interruption or distraction Different expectations when working as opposed to not working Plausible deniability [Nardi et. al. (2000)] “Home” extends into “work” –but rarely vice versa! Different levels of availability for different groups of people based on location and (work) context

Thursday, July 8, 2004DIMACS Workshop, NJ Privacy Regarding Content Expectations similar to –for monitoring, sniffing, saving or sharing Informal policies for sharing Unease at the possibility of the other party saving conversation Switch in medium for sensitive conversations –phone or face-to-face Concern for others watching screen contents –minimize windows –turn off monitor –physical rearrangement (if possible)

Thursday, July 8, 2004DIMACS Workshop, NJ Managing Impression An important driving force behind people’s privacy in the context of IM seems to be the desire to control how they appear to others. –Available to different extent to different groups –Desire to control saving/sharing of conversations Desired impression dependent on relationship –friend, family, peer, superior, stranger etc. Practices influenced by: –defaults, personal preferences, prior knowledge & experiences, group norms, organizational policies, cultural expectations

Thursday, July 8, 2004DIMACS Workshop, NJ Managing Impression The desire to manage one’s impression is likely to strongly influence the point of balance between demands for privacy and the consent to disclose awareness information. Privacy-sensitive collaboration system should empower users to seamlessly manage their “impression” as seen by various parties involved.

Thursday, July 8, 2004DIMACS Workshop, NJ Implications for Design Defaults Provide defaults that are widely applicable across persons and situations. These could include typical profiles (e.g., “manager”, “student”, “secretary”) with appropriate settings. Modifiable policies Allow for user modifiability of default privacy policies, so that users can cater to the current context. Visibility Give users the opportunity to inspect various pieces of information about themselves that can be viewed by others. Interaction Design the interaction with users in such a way that specifying or modifying status, settings or policies requires little or no time and effort.

Thursday, July 8, 2004DIMACS Workshop, NJ Acknowledgments Heather Pulliam Gloria Mark Bonnie Nardi Cleidson de Souza Becky Grinter Paul Dourish Max Teltzrow Keri Carpenter

Thursday, July 8, 2004DIMACS Workshop, NJ Questions